US20160351022A1 - Device fraud indicator detection and reporting - Google Patents

Device fraud indicator detection and reporting Download PDF

Info

Publication number
US20160351022A1
US20160351022A1 US14/725,886 US201514725886A US2016351022A1 US 20160351022 A1 US20160351022 A1 US 20160351022A1 US 201514725886 A US201514725886 A US 201514725886A US 2016351022 A1 US2016351022 A1 US 2016351022A1
Authority
US
United States
Prior art keywords
sst
evaluating
activity
information
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/725,886
Other versions
US10332360B2 (en
Inventor
Gameelah Ghafoor
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citibank NA
JPMorgan Chase Bank NA
Original Assignee
NCR Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NCR Corp filed Critical NCR Corp
Priority to US14/725,886 priority Critical patent/US10332360B2/en
Assigned to NCR CORPORATION reassignment NCR CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GHAFOOR, GAMEELAH
Publication of US20160351022A1 publication Critical patent/US20160351022A1/en
Application granted granted Critical
Publication of US10332360B2 publication Critical patent/US10332360B2/en
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NCR CORPORATION
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE PROPERTY NUMBERS SECTION TO REMOVE PATENT APPLICATION: 15000000 PREVIOUSLY RECORDED AT REEL: 050874 FRAME: 0063. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST. Assignors: NCR CORPORATION
Assigned to CITIBANK, N.A. reassignment CITIBANK, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NCR ATLEOS CORPORATION
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARDTRONICS USA, LLC, NCR ATLEOS CORPORATION
Assigned to NCR VOYIX CORPORATION reassignment NCR VOYIX CORPORATION RELEASE OF PATENT SECURITY INTEREST Assignors: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT
Assigned to CITIBANK, N.A. reassignment CITIBANK, N.A. CORRECTIVE ASSIGNMENT TO CORRECT THE DOCUMENT DATE AND REMOVE THE OATH/DECLARATION (37 CFR 1.63) PREVIOUSLY RECORDED AT REEL: 065331 FRAME: 0297. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST. Assignors: NCR ATLEOS CORPORATION
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/02Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus
    • G07F9/026Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus for alarm, monitoring and auditing in vending machines or means for indication, e.g. when empty
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G3/00Alarm indicators, e.g. bells
    • G07G3/006False operation

Definitions

  • SSTs Self-Service Terminals
  • a security camera may be integrated into the SSTs or in proximity to the SSTs.
  • Common Self-Service Terminals include Automated Teller Machines (ATMs) and self-checkout terminals.
  • ATMs Automated Teller Machines
  • SSTs are connected through a network to a remote system, which allows exchange of bank account or credit card information.
  • An SST typically employs electronic and physical security measures to protect currency stored therein and transaction services performed thereon.
  • Various embodiments herein each include at least one of systems, methods, and software for detection of abnormal operation of a Self-Service Terminal (SST).
  • SST Self-Service Terminal
  • One such embodiment in the form of a method performed by a SST or remote system, includes receiving information relating to the operation of a SST.
  • the information includes operational parameters such as system reboots, initiation of new services, removal of a hard disk, detection of a new hard disk, memory usage greater than a known threshold, change in memory footprint, logging behavior, events within a transaction, usage of a prepaid card, or supervisor access.
  • the method further includes evaluating the information to identify abnormal operation of the SST, such as evaluating two or more pieces of information in combination, identifying a sequence of events, or absence of events from a sequence, that indicate a departure from normal operation, or a combination thereof.
  • Another method embodiment includes detecting abnormal activity relating to a Self-Service Terminal (SST) by receiving data relating to at least two operational parameters of the SST and evaluating the data to identify an activity pattern.
  • the method declares an alert when an identified activity pattern deviates from an expected set of operational states
  • a further embodiment is in the form of a Self-Service Terminal (SST).
  • the SST includes a memory and a processor executing instructions to monitor for abnormal activity on the SST.
  • the processor evaluates activity of at least two operational parameters of the SST in combination. When abnormal activity is detected, the processors execute a responsive action.
  • FIG. 1 is a logical block diagram of a system, according to an example embodiment.
  • FIG. 2 is a block flow diagram of a method, according to an example, embodiment.
  • FIG. 3 is a block flow diagram of a method, according to an example, embodiment.
  • FIG. 4 is a block diagram of a computing device, according to an example embodiment.
  • Various embodiments herein each include at least one of systems, methods, and devices for identification of abnormal operation of a Self-Service Terminal (SST), such as an Automated Teller Machine (ATM).
  • SST Self-Service Terminal
  • ATM Automated Teller Machine
  • Such embodiments support the prevention or interruption of a fraud perpetrated using a SST, as opposed to mere post-fraud information gathering.
  • fraud refers to execution of a transaction through improper activity, e.g. by circumventing or imitating steps required to purchase or receive something of value without true authorization. This may be conducted, for example, through false identification, intrusions through electronic, physical, or software techniques (“hacks”), violating physical or electronic security measures.
  • hacks software techniques
  • Prevention or interruption of fraud both preserves assets that might otherwise be lost to fraud and discourages perpetrators who are thwarted in their efforts to obtain money, objects, or services, or other items of value through fraud.
  • a SST, remote system, or combination thereof actively monitor for indications that fraudulent, or potentially fraudulent, activity is underway.
  • a SST functions alone to monitor for fraud, i.e. the method is performed locally by the SST.
  • the SST sends information to a remote device or system that analyzes the information to determine whether the behavior is potentially fraudulent.
  • a fraud detection is performed by both a SST and a remote system.
  • the SST and remote system may work serially, or in parallel, or otherwise collaborate.
  • a SST performs a first tier of evaluation and, when certain conditions are met, e.g. a potential fraud is detected the remote system performs a second tier of evaluation to further investigate whether a fraud is underway.
  • the remote system may, for example perform more in-depth analysis of information processed by the SST, or may consider additional information obtained from the SST or elsewhere.
  • a SST evaluates activity and, when markers of potential-fraud are identified, triggers passage of information to a remote system for additional evaluation.
  • the SST may also, on its own or at the command of a remote fraud detection system or human user, enters an alternate mode of operation, such as enhanced surveillance, interactive session, lock-down, or alert.
  • actively monitoring for indicators of potentially fraudulent activity allows for recognition of a fraud (or potential fraud) while the fraud is underway.
  • a system monitors for two or more events that, when taken alone, may be benign, but, when evaluated in combination, provide an indication that operation of the SST has deviated from normal expectations, suggesting that a potential fraud is in progress.
  • a potential fraud is identified from a pattern of activity.
  • a SST or remote fraud detection system monitor for a sequence of events that suggest a potential fraud. For example, some embodiments monitor for more than one reset or system reboot in a period of time, in combination with one or more other operational parameters.
  • a potential fraud is identified when two reboots or resets of the SST (or a system in or coupled to the SST) occur in ten minutes.
  • an embodiment develops a level of confidence that a fraud is in progress based upon detected activity. For example, when two or more resets in a period of time (e.g. 10 minutes) are followed by supervisor access, the confidence that a fraud is in progress is greater.
  • a fraud detection system when a potential fraud is detected, a fraud detection system triggers a heightened state of alert, communicates an alert, initiates action to interrupt the fraud, or some combination thereof.
  • the SST monitors for a pattern of activity that suggests a fraud is in progress.
  • the SST may monitor for removal of a USB media device, followed by supervisor access, in combination with use of a pre-paid card in a previous transaction or subsequent transaction.
  • Some embodiments monitor for untypical system behavior, for example based upon application, operating system, or other software or hardware state information. For example, some example embodiments monitor for increased memory footprint when no transactions have occurred in a specified period of time (e.g. 30 minutes) and no software download is taking place.
  • a specified period of time e.g. 30 minutes
  • Some embodiments on detection of potential fraud, initiate a shutdown of the SST, take a photograph or video footage, send an alert to law enforcement, or a combination thereof.
  • a remote fraud detection system receives information from a SST and analyzes the information to detect instances of potential fraud, which it communicates to a SST monitoring system, the ATM, or both.
  • the SST communicates with an APTRA tm Vision system, available from NCR Corporation.
  • APTRA Vision facilitates human intervention or interaction with a SST, or cooperates with a system that does so.
  • APTRA Vision communicates with a FractalsTM fraud detection system (available from NCR Corporation), which monitors SST activity or transactions.
  • the Fractals system communicates directly with a SST regarding transactions or detected activity.
  • the functions or algorithms described herein are implemented in hardware, software or a combination of software and hardware in one embodiment.
  • the software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, described functions may correspond to modules, which may be software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples.
  • the software is executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including network interconnection devices.
  • Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit.
  • the exemplary process flow is applicable to software, firmware, and hardware implementations.
  • FIG. 1 is a logical block diagram of a system 100 , according to an example embodiment.
  • the system includes a self-service terminal (SST) 102 .
  • the SST 102 is a terminal through which customers can interact and conduct transactions.
  • the SST 102 may be a self-service checkout terminal.
  • the SST 102 may be an ATM.
  • the SST 112 may be a gaming machine or other machine on which one or both of secure customer interactions and transaction may be conducted.
  • the SST 102 is communicatively coupled to a wired or wireless network through which it can communicate to a SST management system running on at least one server 104 .
  • the server 104 is typically connected to a network, such as the Internet, that allows processes that execute on the servers 104 to communicate with various SSTs, computers, or mobile devices.
  • the server 104 may also be connected to a secure network, which may be dedicated at least in part to communicating with SSTs 102 , such as an ATM network.
  • the secure network 110 may rely on secure networking protocols that allow secure data to be carried on other networks, such as the Internet. However, in some embodiments, the secure network 110 may be, at least in part, a physically secured network.
  • the server 104 is in communication with a fraud detection system 106 .
  • the SST management system is also in communication with a SST monitoring system 108 , a payment network 110 , e.g. credit card service providers, and a banking system 112 , with which financial transactions are processed.
  • the SST management system 104 is APTRATM Vision, available from NCRTM.
  • the fraud detection system is the FractalsTM system, available from NCR.
  • the server 104 receives information about operational parameters of the SST 102 from the SST 102 and provides at least some of the information to the fraud detection system 106 .
  • the fraud detection system 106 monitors the information from the SST 102 for indicators of potential fraud.
  • the monitoring by the fraud detection includes analyzing operational state information for deviation from expected norms, checking for an expected series of events preceding a financial transaction, or monitoring reported activity for patterns indicative of fraud.
  • the fraud detection system 106 communicates to the server 104 when a potential fraud is detected.
  • the server communicates to the SST 102 to initiate responsive action.
  • the responsive action includes collection or transfer of additional information (e.g. collect more operational data, take camera snapshots, or capture video footage), a mode change (e.g. switching to interactive mode with a remote user), suspend (or later authorize) a transaction, or shut down or block local communication with the SST.
  • the fraud detection system 106 communicates directly with the SST 102 .
  • the fraud detection system 106 may request more information, change mode, suspend a transaction, authorize a previously-suspended transaction, or shut down or block communication with the SST.
  • the fraud detection system communicates with both the server 104 and SST 102 to execute fraud detection methods or communicate or authorize transactions.
  • a monitoring system 108 may be in communication with the server.
  • the monitoring system is a component or extension of a SST monitoring system running on a server 102 , such as a portal running on a desktop or laptop computer, tablet, phone, or other device.
  • the monitoring system 108 presents a human-viewable dashboard of activity at a SST 102 , or a group of SSTs.
  • a potential fraud alert is presented on the dashboard.
  • an interactive session is accessible on the monitoring system 108 to facilitate an interactive mode with a SST 102 .
  • FIG. 2 is a block flow diagram of an example method 200 executable on example systems and devices. The method includes receiving 202 information relating to the operation of a SST.
  • the information is evaluated 204 to identify potentially fraudulent activity.
  • a fraud detection system monitors for indicators of potentially-fraudulent activity, such as two reboots or resets within a specified period of time, especially without a corresponding authorization (e.g. field service ticket) or in conjunction with the initiation of a new service.
  • the evaluating 204 includes identifying a sequence of events, or absence of events from a sequence, that indicate a departure from expected (normal) operation.
  • the method 200 includes receiving at least two qualitatively distinct pieces of information relating to the operation of the SST, and evaluating 204 the at least two qualitatively distinct pieces of information in combination. The method 200 may also include identifying two or more changes occurring within a specified timeframe.
  • the method includes monitoring for changes of two or more of the following within a specified timeframe or under specified conditions: system reboot; initiation of new services; removal of a hard disk; detection of a new hard disk; memory usage greater than a known threshold; memory footprint; logging behavior; specified events within a transaction; usage of a prepaid card; supervisor access.
  • the method 200 also includes one or more of additional steps 206 , 208 , 210 , 2012 , 214 , 216 in series or parallel.
  • the method 200 transfers information relating to the operation of a SST to a remote system for further analysis or review. While in some examples the method 200 may be executed locally on a SST, in other examples the method is executed solely on a remote fraud detection system, or jointly with cooperation between a SST and remote fraud detection system. Involvement of a remote fraud detection system allows for execution of more rigorous fraud detection algorithms and integration of information from a SST with other information, e.g. a knowledge database of prior fraudulent activity, or recent activity at other SSTs, especially if the SSTs are in near geographic proximity, suggesting a local pattern of potential fraud.
  • the method evaluates additional information relating to the operation of the SST.
  • evaluation of operational information by the SST triggers more in-depth analysis using additional information, which may come from the SST or elsewhere (e.g. other SSTs or obtained from the server.
  • additional information may come from the SST or elsewhere (e.g. other SSTs or obtained from the server.
  • the local or remote fraud detection system notices something that moves the system into a heightened detection state, where the fraud detection system evaluates more information, evaluates more frequently, or performs more in-depth analysis.
  • the method identifies activity as a potential fraud and the system gathers additional information to further investigate whether fraud is occurring to increase the confidence level before taking more disruptive action (e.g. initiating an interactive mode or shutting down the SST.)
  • the method 200 triggers capture of additional information relating to the operation of the SST.
  • logging is increased, or operational state information is captured and relayed to the fraud detection system.
  • camera, audio, or video information is captured.
  • the method 200 shuts down or blocks access to the SST. If a fraud or potential fraud is identified, the fraud may be stopped by disrupting operation of the SST. For example, electronic or physical access to the SST may be blocked by locking the system, or the system may be shut down completely, or certain functions (e.g. dispensing an item such as cash) may be blocked.
  • the method 200 initiates an interactive mode.
  • a SST user communicates with a person in a remote location using a text chat system, audio system, or video system.
  • the method 200 changes the behavior of other SSTs in a specific geographic region around the SST.
  • fraud detection at other SSTs is modified to account for the identified pattern.
  • additional data collection such as video streaming or capture, is initiated at other SSTs. This may enable, for example, detection of fraud at other SSTs or identification of a fraud perpetrator who attacks multiple systems.
  • additional information may be evaluated 208 , leading to capture of additional information 210 and transfer of information to a remote system 206 , which may lead to initiation of interactive mode 214 or system shut-down 212 .
  • Other combinations are possible.
  • the method 200 includes taking action to interrupt potentially-unauthorized activity.
  • the method 200 includes triggering an alert at the SST, which may include notification of police or other authorities, biometric capture (e.g. photograph, audio, video, fingerprint, facial recognition, etc.), creating a visual or audio disturbance (e.g. flashing lights or sounds), shutting down or blocking access to the SST.
  • biometric capture e.g. photograph, audio, video, fingerprint, facial recognition, etc.
  • creating a visual or audio disturbance e.g. flashing lights or sounds
  • FIG. 3 is a block flow diagram of an example method 300 executable on example systems and devices.
  • the method includes capturing 302 data relating to at least two operational parameters of the SST.
  • data is transferred 304 from the SST to the remote system.
  • the method is performed on a SST, so the transfer occurs locally between components installed at a SST, or the transfer 304 is omitted and the subsequent steps occur within the SST system that captured the data.
  • information is collected locally and sent to a remote fraud detection system for analysis.
  • the SST runs local fraud detection system and, if potentially fraudulent activity is detected, the local fraud detection system sends information for further analysis by a remote fraud detection system, which may perform more in depth analysis, request additional information from the SST, or trigger an alert.
  • the method 300 further includes evaluating 306 the data to identify an activity pattern.
  • the method includes checking for a series of expected events leading up to an event, such as the dispensing of an item (e.g. cash, valuables, stamps, gift cards, services, or a printed bar code that can be exchanged for goods or services.)
  • the method may include, for example, checking for the presence of a log, or the contents of the log.
  • the method may also include evaluating changes in state, memory usage, and hardware configuration.
  • the method monitors for a pattern of activity of events or states that in insolation may seem benign, but in combination indicate fraud, or potential fraud.
  • the method may evaluate a combination system reboot; initiation of new services; removal of a hard disk; detection of a new hard disk; memory usage greater than a known threshold; memory footprint; logging behavior; events within a transaction; usage of a prepaid card; and supervisor access.
  • the method further includes 300 triggering 308 an alert.
  • declaring the alert 308 sends a notification to a management system.
  • declaring the alert 308 triggers collection or analysis of additional information or transfer of information to a remote fraud detection system.
  • declaring the alert 308 notifies authorities (e.g. police or security personnel) that a potentially-fraudulent event is in progress.
  • declaring the alert 308 changes the behavior of the SST, or other SSTs in geographic proximity to the SST.
  • FIG. 4 is a block diagram of a computing device, according to an example embodiment.
  • multiple such computer systems are utilized in a distributed network to implement multiple components in a transaction-based environment.
  • An object-oriented, service-oriented, or other architecture may be used to implement such functions and communicate between the multiple systems and components.
  • One example computing device in the form of a computer 410 may include a processing unit 402 , memory 404 , removable storage 412 , and non-removable storage 414 .
  • the example computing device is illustrated and described as computer 410 , the computing device may be in different forms in different embodiments.
  • the computing device may instead be a smartphone, a tablet, smartwatch, or other computing device including the same or similar elements as illustrated and described with regard to FIG. 4 .
  • Devices such as smartphones, tablets, and smartwatches are generally collectively referred to as mobile devices.
  • the various data storage elements are illustrated as part of the computer 410 , the storage may also or alternatively include cloud-based storage accessible via a network, such as the Internet.
  • memory 404 may include volatile memory 406 and non-volatile memory 408 .
  • Computer 410 may include—or have access to a computing environment that includes a variety of computer-readable media, such as volatile memory 406 and non-volatile memory 408 , removable storage 412 and non-removable storage 414 .
  • Computer storage includes random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, compact disc read-only memory (CD ROM), Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions.
  • RAM random access memory
  • ROM read only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory or other memory technologies
  • compact disc read-only memory (CD ROM) compact disc read-only memory
  • DVD Digital Versatile Disks
  • magnetic cassettes magnetic tape
  • magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions.
  • Computer 410 may include or have access to a computing environment that includes input 416 , output 418 , and a communication connection 420 .
  • the input 416 may include one or more of a touchscreen, touchpad, mouse, keyboard, camera, one or more device-specific buttons, one or more sensors integrated within or coupled via wired or wireless data connections to the computer 410 , and other input devices.
  • the computer 410 may operate in a networked environment using a communication connection 420 to connect to one or more remote computers, such as database servers, web servers, and other computing device.
  • An example remote computer may include a personal computer (PC), server, router, network PC, a peer device or other common network node, or the like.
  • the communication connection 420 may be a network interface device such as one or both of an Ethernet card and a wireless card or circuit that may be connected to a network.
  • the network may include one or more of a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, and other networks.
  • the communication connection 420 may also or alternatively include a transceiver device, such as a BLUETOOTH® device that enables the computer 410 to wirelessly receive data from and transmit data to other BLUETOOTH® devices.
  • Computer 410 also typically includes an out-of-band controller 422 .
  • Computer-readable instructions stored on a computer-readable medium are executable by the processing unit 402 of the computer 410 .
  • a hard drive magnetic disk or solid state
  • CD-ROM compact disc or solid state
  • RAM random access memory
  • various computer programs 425 or apps such as one or more applications and modules implementing one or more of the methods illustrated and described herein or an app or application that executes on a mobile device or is accessible via a web browser, may be stored on a non-transitory computer-readable medium.

Abstract

Various embodiments herein each include at least one of systems, devices and methods for detection of abnormal operation of a Self-Service Terminal (SST). One such embodiment, in the form of a method performed by a SST or remote system, includes receiving information relating to the operation of a SST. The method further includes evaluating the information to identify abnormal operation of the SST.

Description

    BACKGROUND INFORMATION
  • Increasingly consumers are conducting financial transactions through Self-Service Terminals (SSTs) without the assistance of a teller or clerk. In fact, in many cases these transactions are conducted without any individual, other than a consumer, in the vicinity of the SSTs. In some cases, a security camera may be integrated into the SSTs or in proximity to the SSTs.
  • Common Self-Service Terminals include Automated Teller Machines (ATMs) and self-checkout terminals. Most SSTs are connected through a network to a remote system, which allows exchange of bank account or credit card information. An SST typically employs electronic and physical security measures to protect currency stored therein and transaction services performed thereon.
  • When a SST is manipulated to conduct unauthorized activity, the manipulation may not be detected until long after the act is complete. Security camera recordings may be reviewed for evidence of tampering and police may be involved to apprehend perpetrators, if they can be identified.
  • SUMMARY
  • Various embodiments herein each include at least one of systems, methods, and software for detection of abnormal operation of a Self-Service Terminal (SST).
  • One such embodiment, in the form of a method performed by a SST or remote system, includes receiving information relating to the operation of a SST. In various examples, the information includes operational parameters such as system reboots, initiation of new services, removal of a hard disk, detection of a new hard disk, memory usage greater than a known threshold, change in memory footprint, logging behavior, events within a transaction, usage of a prepaid card, or supervisor access. The method further includes evaluating the information to identify abnormal operation of the SST, such as evaluating two or more pieces of information in combination, identifying a sequence of events, or absence of events from a sequence, that indicate a departure from normal operation, or a combination thereof.
  • Another method embodiment includes detecting abnormal activity relating to a Self-Service Terminal (SST) by receiving data relating to at least two operational parameters of the SST and evaluating the data to identify an activity pattern. The method declares an alert when an identified activity pattern deviates from an expected set of operational states
  • A further embodiment is in the form of a Self-Service Terminal (SST). The SST includes a memory and a processor executing instructions to monitor for abnormal activity on the SST. The processor evaluates activity of at least two operational parameters of the SST in combination. When abnormal activity is detected, the processors execute a responsive action.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a logical block diagram of a system, according to an example embodiment.
  • FIG. 2 is a block flow diagram of a method, according to an example, embodiment.
  • FIG. 3 is a block flow diagram of a method, according to an example, embodiment.
  • FIG. 4 is a block diagram of a computing device, according to an example embodiment.
  • DETAILED DESCRIPTION
  • Various embodiments herein each include at least one of systems, methods, and devices for identification of abnormal operation of a Self-Service Terminal (SST), such as an Automated Teller Machine (ATM). Such embodiments support the prevention or interruption of a fraud perpetrated using a SST, as opposed to mere post-fraud information gathering. As used herein, fraud refers to execution of a transaction through improper activity, e.g. by circumventing or imitating steps required to purchase or receive something of value without true authorization. This may be conducted, for example, through false identification, intrusions through electronic, physical, or software techniques (“hacks”), violating physical or electronic security measures. Prevention or interruption of fraud both preserves assets that might otherwise be lost to fraud and discourages perpetrators who are thwarted in their efforts to obtain money, objects, or services, or other items of value through fraud.
  • In some embodiments, a SST, remote system, or combination thereof actively monitor for indications that fraudulent, or potentially fraudulent, activity is underway. In some embodiments, a SST functions alone to monitor for fraud, i.e. the method is performed locally by the SST. In other embodiments, the SST sends information to a remote device or system that analyzes the information to determine whether the behavior is potentially fraudulent.
  • In some embodiments, a fraud detection is performed by both a SST and a remote system. The SST and remote system may work serially, or in parallel, or otherwise collaborate. In an example, a SST performs a first tier of evaluation and, when certain conditions are met, e.g. a potential fraud is detected the remote system performs a second tier of evaluation to further investigate whether a fraud is underway. The remote system may, for example perform more in-depth analysis of information processed by the SST, or may consider additional information obtained from the SST or elsewhere.
  • In some example embodiments, a SST evaluates activity and, when markers of potential-fraud are identified, triggers passage of information to a remote system for additional evaluation. The SST may also, on its own or at the command of a remote fraud detection system or human user, enters an alternate mode of operation, such as enhanced surveillance, interactive session, lock-down, or alert.
  • In some embodiments, actively monitoring for indicators of potentially fraudulent activity allows for recognition of a fraud (or potential fraud) while the fraud is underway. In some embodiments, a system monitors for two or more events that, when taken alone, may be benign, but, when evaluated in combination, provide an indication that operation of the SST has deviated from normal expectations, suggesting that a potential fraud is in progress.
  • In some example embodiments, a potential fraud is identified from a pattern of activity. In some embodiments, a SST or remote fraud detection system monitor for a sequence of events that suggest a potential fraud. For example, some embodiments monitor for more than one reset or system reboot in a period of time, in combination with one or more other operational parameters. In an example, a potential fraud is identified when two reboots or resets of the SST (or a system in or coupled to the SST) occur in ten minutes. In an example, an embodiment develops a level of confidence that a fraud is in progress based upon detected activity. For example, when two or more resets in a period of time (e.g. 10 minutes) are followed by supervisor access, the confidence that a fraud is in progress is greater. And when further followed by removal of a USB camera and subsequent supervisor access within a minute, that confidence is greater still. And when a system detect of some or all of the foregoing pattern multiple resets in a relatively short period, e.g. 10 minutes, followed by supervisor access, is followed by removal of a US camera and supervisor access, the system develops strong confidence that a fraud may be underway. In some embodiments, when a potential fraud is detected, a fraud detection system triggers a heightened state of alert, communicates an alert, initiates action to interrupt the fraud, or some combination thereof.
  • In an example, the SST monitors for a pattern of activity that suggests a fraud is in progress. For example, the SST may monitor for removal of a USB media device, followed by supervisor access, in combination with use of a pre-paid card in a previous transaction or subsequent transaction.
  • Some embodiments monitor for untypical system behavior, for example based upon application, operating system, or other software or hardware state information. For example, some example embodiments monitor for increased memory footprint when no transactions have occurred in a specified period of time (e.g. 30 minutes) and no software download is taking place.
  • Some embodiments, on detection of potential fraud, initiate a shutdown of the SST, take a photograph or video footage, send an alert to law enforcement, or a combination thereof.
  • In an example, a remote fraud detection system receives information from a SST and analyzes the information to detect instances of potential fraud, which it communicates to a SST monitoring system, the ATM, or both. In an example embodiment, the SST communicates with an APTRAtm Vision system, available from NCR Corporation. In some examples, APTRA Vision facilitates human intervention or interaction with a SST, or cooperates with a system that does so. In example embodiments, APTRA Vision communicates with a Fractals™ fraud detection system (available from NCR Corporation), which monitors SST activity or transactions. In some examples, the Fractals system communicates directly with a SST regarding transactions or detected activity.
  • In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical, and electrical changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, herein by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
  • The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
  • The functions or algorithms described herein are implemented in hardware, software or a combination of software and hardware in one embodiment. The software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, described functions may correspond to modules, which may be software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. The software is executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including network interconnection devices.
  • Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the exemplary process flow is applicable to software, firmware, and hardware implementations.
  • FIG. 1 is a logical block diagram of a system 100, according to an example embodiment. The system includes a self-service terminal (SST) 102. The SST 102 is a terminal through which customers can interact and conduct transactions. In some embodiments, the SST 102 may be a self-service checkout terminal. In other embodiments, the SST 102 may be an ATM. In further embodiments, the SST 112 may be a gaming machine or other machine on which one or both of secure customer interactions and transaction may be conducted.
  • The SST 102 is communicatively coupled to a wired or wireless network through which it can communicate to a SST management system running on at least one server 104. The server 104 is typically connected to a network, such as the Internet, that allows processes that execute on the servers 104 to communicate with various SSTs, computers, or mobile devices. The server 104 may also be connected to a secure network, which may be dedicated at least in part to communicating with SSTs 102, such as an ATM network. The secure network 110 may rely on secure networking protocols that allow secure data to be carried on other networks, such as the Internet. However, in some embodiments, the secure network 110 may be, at least in part, a physically secured network.
  • The server 104 is in communication with a fraud detection system 106. In example embodiments, the SST management system is also in communication with a SST monitoring system 108, a payment network 110, e.g. credit card service providers, and a banking system 112, with which financial transactions are processed.
  • In an example, the SST management system 104 is APTRA™ Vision, available from NCR™. In an example, the fraud detection system is the Fractals™ system, available from NCR. The server 104 receives information about operational parameters of the SST 102 from the SST 102 and provides at least some of the information to the fraud detection system 106. The fraud detection system 106 monitors the information from the SST 102 for indicators of potential fraud. In an example, the monitoring by the fraud detection includes analyzing operational state information for deviation from expected norms, checking for an expected series of events preceding a financial transaction, or monitoring reported activity for patterns indicative of fraud.
  • In an example embodiment, the fraud detection system 106 communicates to the server 104 when a potential fraud is detected. In example embodiments, the server communicates to the SST 102 to initiate responsive action. In some examples, the responsive action includes collection or transfer of additional information (e.g. collect more operational data, take camera snapshots, or capture video footage), a mode change (e.g. switching to interactive mode with a remote user), suspend (or later authorize) a transaction, or shut down or block local communication with the SST.
  • In some examples, the fraud detection system 106 communicates directly with the SST 102. For example, the fraud detection system 106 may request more information, change mode, suspend a transaction, authorize a previously-suspended transaction, or shut down or block communication with the SST. In some examples, the fraud detection system communicates with both the server 104 and SST 102 to execute fraud detection methods or communicate or authorize transactions.
  • A monitoring system 108 may be in communication with the server. In an example, the monitoring system is a component or extension of a SST monitoring system running on a server 102, such as a portal running on a desktop or laptop computer, tablet, phone, or other device. In an example, the monitoring system 108 presents a human-viewable dashboard of activity at a SST 102, or a group of SSTs. In an example embodiment, a potential fraud alert is presented on the dashboard. In an example embodiment, an interactive session is accessible on the monitoring system 108 to facilitate an interactive mode with a SST 102.
  • FIG. 2 is a block flow diagram of an example method 200 executable on example systems and devices. The method includes receiving 202 information relating to the operation of a SST.
  • The information is evaluated 204 to identify potentially fraudulent activity. In some example methods, a fraud detection system monitors for indicators of potentially-fraudulent activity, such as two reboots or resets within a specified period of time, especially without a corresponding authorization (e.g. field service ticket) or in conjunction with the initiation of a new service. In some examples, the evaluating 204 includes identifying a sequence of events, or absence of events from a sequence, that indicate a departure from expected (normal) operation. In some example embodiments, the method 200 includes receiving at least two qualitatively distinct pieces of information relating to the operation of the SST, and evaluating 204 the at least two qualitatively distinct pieces of information in combination. The method 200 may also include identifying two or more changes occurring within a specified timeframe. In some example embodiments, the method includes monitoring for changes of two or more of the following within a specified timeframe or under specified conditions: system reboot; initiation of new services; removal of a hard disk; detection of a new hard disk; memory usage greater than a known threshold; memory footprint; logging behavior; specified events within a transaction; usage of a prepaid card; supervisor access.
  • In some examples, the method 200 also includes one or more of additional steps 206, 208, 210, 2012, 214, 216 in series or parallel. At 206, the method 200 transfers information relating to the operation of a SST to a remote system for further analysis or review. While in some examples the method 200 may be executed locally on a SST, in other examples the method is executed solely on a remote fraud detection system, or jointly with cooperation between a SST and remote fraud detection system. Involvement of a remote fraud detection system allows for execution of more rigorous fraud detection algorithms and integration of information from a SST with other information, e.g. a knowledge database of prior fraudulent activity, or recent activity at other SSTs, especially if the SSTs are in near geographic proximity, suggesting a local pattern of potential fraud.
  • At 208 the method evaluates additional information relating to the operation of the SST. In some examples, evaluation of operational information by the SST triggers more in-depth analysis using additional information, which may come from the SST or elsewhere (e.g. other SSTs or obtained from the server. For example, the local or remote fraud detection system notices something that moves the system into a heightened detection state, where the fraud detection system evaluates more information, evaluates more frequently, or performs more in-depth analysis. In some examples, the method identifies activity as a potential fraud and the system gathers additional information to further investigate whether fraud is occurring to increase the confidence level before taking more disruptive action (e.g. initiating an interactive mode or shutting down the SST.)
  • At 210, the method 200 triggers capture of additional information relating to the operation of the SST. In an example, logging is increased, or operational state information is captured and relayed to the fraud detection system. In some examples, camera, audio, or video information is captured.
  • At 212, the method 200 shuts down or blocks access to the SST. If a fraud or potential fraud is identified, the fraud may be stopped by disrupting operation of the SST. For example, electronic or physical access to the SST may be blocked by locking the system, or the system may be shut down completely, or certain functions (e.g. dispensing an item such as cash) may be blocked.
  • At 214, the method 200 initiates an interactive mode. In an example, a SST user communicates with a person in a remote location using a text chat system, audio system, or video system.
  • At 216, the method 200 changes the behavior of other SSTs in a specific geographic region around the SST. In an example, when a pattern of potential fraud is detected at a SST, fraud detection at other SSTs is modified to account for the identified pattern. In an example, when a pattern of potential fraud is detected at a SST, additional data collection, such as video streaming or capture, is initiated at other SSTs. This may enable, for example, detection of fraud at other SSTs or identification of a fraud perpetrator who attacks multiple systems.
  • These various actions may occur in combination, e.g. additional information may be evaluated 208, leading to capture of additional information 210 and transfer of information to a remote system 206, which may lead to initiation of interactive mode 214 or system shut-down 212. Other combinations are possible.
  • At 218, the method 200 includes taking action to interrupt potentially-unauthorized activity. In an example, the method 200 includes triggering an alert at the SST, which may include notification of police or other authorities, biometric capture (e.g. photograph, audio, video, fingerprint, facial recognition, etc.), creating a visual or audio disturbance (e.g. flashing lights or sounds), shutting down or blocking access to the SST.
  • FIG. 3 is a block flow diagram of an example method 300 executable on example systems and devices. The method includes capturing 302 data relating to at least two operational parameters of the SST. When the method is executed partially or completely on one more remote systems, data is transferred 304 from the SST to the remote system. In some examples, the method is performed on a SST, so the transfer occurs locally between components installed at a SST, or the transfer 304 is omitted and the subsequent steps occur within the SST system that captured the data. In some examples, information is collected locally and sent to a remote fraud detection system for analysis. In another example, the SST runs local fraud detection system and, if potentially fraudulent activity is detected, the local fraud detection system sends information for further analysis by a remote fraud detection system, which may perform more in depth analysis, request additional information from the SST, or trigger an alert.
  • The method 300 further includes evaluating 306 the data to identify an activity pattern. In an example, the method includes checking for a series of expected events leading up to an event, such as the dispensing of an item (e.g. cash, valuables, stamps, gift cards, services, or a printed bar code that can be exchanged for goods or services.) The method may include, for example, checking for the presence of a log, or the contents of the log. The method may also include evaluating changes in state, memory usage, and hardware configuration. In some examples, the method monitors for a pattern of activity of events or states that in insolation may seem benign, but in combination indicate fraud, or potential fraud. For example, the method may evaluate a combination system reboot; initiation of new services; removal of a hard disk; detection of a new hard disk; memory usage greater than a known threshold; memory footprint; logging behavior; events within a transaction; usage of a prepaid card; and supervisor access.
  • The method further includes 300 triggering 308 an alert. In an example, declaring the alert 308 sends a notification to a management system. In another example, declaring the alert 308 triggers collection or analysis of additional information or transfer of information to a remote fraud detection system. In another example, declaring the alert 308 notifies authorities (e.g. police or security personnel) that a potentially-fraudulent event is in progress. In another example, declaring the alert 308 changes the behavior of the SST, or other SSTs in geographic proximity to the SST.
  • FIG. 4 is a block diagram of a computing device, according to an example embodiment. In one embodiment, multiple such computer systems are utilized in a distributed network to implement multiple components in a transaction-based environment. An object-oriented, service-oriented, or other architecture may be used to implement such functions and communicate between the multiple systems and components. One example computing device in the form of a computer 410, may include a processing unit 402, memory 404, removable storage 412, and non-removable storage 414. Although the example computing device is illustrated and described as computer 410, the computing device may be in different forms in different embodiments. For example, the computing device may instead be a smartphone, a tablet, smartwatch, or other computing device including the same or similar elements as illustrated and described with regard to FIG. 4. Devices such as smartphones, tablets, and smartwatches are generally collectively referred to as mobile devices. Further, although the various data storage elements are illustrated as part of the computer 410, the storage may also or alternatively include cloud-based storage accessible via a network, such as the Internet.
  • Returning to the computer 410, memory 404 may include volatile memory 406 and non-volatile memory 408. Computer 410 may include—or have access to a computing environment that includes a variety of computer-readable media, such as volatile memory 406 and non-volatile memory 408, removable storage 412 and non-removable storage 414. Computer storage includes random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, compact disc read-only memory (CD ROM), Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions.
  • Computer 410 may include or have access to a computing environment that includes input 416, output 418, and a communication connection 420. The input 416 may include one or more of a touchscreen, touchpad, mouse, keyboard, camera, one or more device-specific buttons, one or more sensors integrated within or coupled via wired or wireless data connections to the computer 410, and other input devices. The computer 410 may operate in a networked environment using a communication connection 420 to connect to one or more remote computers, such as database servers, web servers, and other computing device. An example remote computer may include a personal computer (PC), server, router, network PC, a peer device or other common network node, or the like. The communication connection 420 may be a network interface device such as one or both of an Ethernet card and a wireless card or circuit that may be connected to a network. The network may include one or more of a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, and other networks. In some embodiments, the communication connection 420 may also or alternatively include a transceiver device, such as a BLUETOOTH® device that enables the computer 410 to wirelessly receive data from and transmit data to other BLUETOOTH® devices. Computer 410 also typically includes an out-of-band controller 422.
  • Computer-readable instructions stored on a computer-readable medium are executable by the processing unit 402 of the computer 410. A hard drive (magnetic disk or solid state), CD-ROM, and RAM are some examples of articles including a non-transitory computer-readable medium. For example, various computer programs 425 or apps, such as one or more applications and modules implementing one or more of the methods illustrated and described herein or an app or application that executes on a mobile device or is accessible via a web browser, may be stored on a non-transitory computer-readable medium.
  • It will be readily understood to those skilled in the art that various other changes in the details, material, and arrangements of the parts and method stages which have been described and illustrated in order to explain the nature of the inventive subject matter may be made without departing from the principles and scope of the inventive subject matter as expressed in the claims.

Claims (20)

What is claimed is:
1. A method of identifying abnormal operation of a Self-Service Terminal (SST), comprising:
receiving information relating to the operation of a SST; and
evaluating the information to identify abnormal operation of the SST.
2. The method of claim 1, wherein evaluating the information to identify abnormal operation of the SST comprises identifying a sequence of events, or absence of events from a sequence, that indicate a departure from normal operation.
3. The method of claim 1, wherein receiving information relating to the operation of a SST comprises receiving at least two qualitatively distinct pieces of information relating to the operation of the SST, and evaluating the information to identify abnormal operation of the SST comprises evaluating the at least two qualitatively distinct pieces of information in combination.
4. The method of claim 3, wherein evaluating the at least two qualitatively distinct pieces of information comprises evaluating at least two of:
system reboot;
initiation of new services;
removal of a hard disk
detection of a new hard disk;
memory usage greater than a known threshold;
memory footprint;
logging behavior;
events within a transaction;
usage of a prepaid card; and
supervisor access.
5. The method of claim 1, wherein evaluating the information to identify abnormal operation of the SST comprises monitoring for an increase in memory footprint when no transactions have occurred in a specified period of time and no software download is taking place.
6. The method of claim 1, further comprising sending information relating to the operation of a SST to a remote system for further analysis or review, and receiving a command from the remote system to initiate preventative action to interrupt potentially-unauthorized activity.
7. The method of claim 1, further comprising, when abnormal operation of the SST is identified, at least one of evaluating additional information relating to the operation of the SST, triggering capture of additional information relating to the operation of the SST, transferring information about operation of the SST to a another device or system for further analysis, shutting down or blocking access to the SST, and entering a specified mode of operation.
8. The method of claim 1, further comprising, when abnormal operation of the SST is identified, entering an interactive mode wherein a user may interact with a remote user to complete a transaction.
9. The method of claim 1, further comprising, when abnormal operation of the SST is identified, changing the behavior of other SSTs in a specific geographic region around the SST.
10. A method of detecting abnormal activity relating to Self-Service Terminal (SST) comprising:
receiving data relating to at least two operational parameters of the SST;
evaluating the data to identify an activity pattern; and
declaring an alert when an identified activity pattern deviates from an expected set of operational states.
11. The method of claim 10, wherein evaluating the data to identify an activity pattern comprises ascertaining whether an expected series of events occur before a specified event.
12. The method of claim 11, wherein the specified event is the dispensing of an item and the expected series of events comprise expected authorizing activity leading up to the dispensing of an item.
13. The method of claim 10, wherein the evaluating the data comprises evaluating at least two of changes in state, memory usage, and hardware configuration.
14. The method of claim 10, further comprising capturing data relating to the operational parameters of the SST using the SST and transferring the data from the SST to a remote system, wherein the receiving data, evaluating the data, and declaring an alert occur on the remote system.
15. A Self-Service Terminal (SST) comprising:
a memory;
a processor executing instructions to monitor for abnormal activity on the SST, the processor operable to evaluate activity of at least two operational parameters of the SST in combination and execute a responsive action when abnormal activity is detected.
16. The self-service terminal of claim 15, wherein the processor is operable to initiate capture of additional information in response to detection of abnormal activity.
17. The self-service terminal of claim 15, wherein the processor is operable to, prior to dispensing cash, evaluate whether the activity of the at least two operational parameters of the SST indicate abnormal activity, and refrain from dispensing cash when abnormal activity is detected.
18. The SST of claim 15, further comprising a network connection, wherein the processor is further operable to initiate transfer of information to a remote system when abnormal activity is detected.
19. The SST of claim 18, wherein the processor is further operable to receive an instruction from a remote system to change the behavior of the SST, the change in behavior comprising at least one evaluating additional information relating to the operation of the SST, triggering capture of additional information relating to the operation of the SST, sending information about operation of the SST to a remote device or system for further analysis, shutting down or blocking access to the SST, and entering an interactive mode
20. The SST of claim 15, wherein the SST is an Automated Teller Machine (ATM).
US14/725,886 2015-05-29 2015-05-29 Device fraud indicator detection and reporting Active 2036-09-03 US10332360B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/725,886 US10332360B2 (en) 2015-05-29 2015-05-29 Device fraud indicator detection and reporting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/725,886 US10332360B2 (en) 2015-05-29 2015-05-29 Device fraud indicator detection and reporting

Publications (2)

Publication Number Publication Date
US20160351022A1 true US20160351022A1 (en) 2016-12-01
US10332360B2 US10332360B2 (en) 2019-06-25

Family

ID=57397571

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/725,886 Active 2036-09-03 US10332360B2 (en) 2015-05-29 2015-05-29 Device fraud indicator detection and reporting

Country Status (1)

Country Link
US (1) US10332360B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11457042B1 (en) * 2018-02-27 2022-09-27 Wells Fargo Bank, N.A. Multi-tiered system for detecting and reducing unauthorized network access

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9930186B2 (en) * 2015-10-14 2018-03-27 Pindrop Security, Inc. Call detail record analysis to identify fraudulent activity
US11244127B1 (en) 2020-09-25 2022-02-08 Bank Of America Corporation Mobile application-based error response
US11783337B2 (en) 2020-09-25 2023-10-10 Bank Of America Corporation Mobile application-based error reporting
US11610457B2 (en) 2020-11-03 2023-03-21 Bank Of America Corporation Detecting unauthorized activity related to a computer peripheral device by monitoring voltage of the peripheral device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050205675A1 (en) * 2004-03-18 2005-09-22 Ncr Corporation Self-service terminal
US9004353B1 (en) * 2012-03-12 2015-04-14 Diebold Self-Service Systems Division Of Diebold, Incorporated Check cashing automated banking machine
US9342963B1 (en) * 2011-04-14 2016-05-17 Bank Of America Corporation Geo-spatial-awareness-based monitoring, notification and maintenance for self service terminals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050205675A1 (en) * 2004-03-18 2005-09-22 Ncr Corporation Self-service terminal
US9342963B1 (en) * 2011-04-14 2016-05-17 Bank Of America Corporation Geo-spatial-awareness-based monitoring, notification and maintenance for self service terminals
US9004353B1 (en) * 2012-03-12 2015-04-14 Diebold Self-Service Systems Division Of Diebold, Incorporated Check cashing automated banking machine

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11457042B1 (en) * 2018-02-27 2022-09-27 Wells Fargo Bank, N.A. Multi-tiered system for detecting and reducing unauthorized network access

Also Published As

Publication number Publication date
US10332360B2 (en) 2019-06-25

Similar Documents

Publication Publication Date Title
US10332360B2 (en) Device fraud indicator detection and reporting
JP6204491B2 (en) Verification of fraud in self-checkout terminals
US10311419B2 (en) Apparatus and method for monitoring security of a point-of-sale terminal
US10878430B1 (en) Anti-skimming card reader computing device
US20220215395A1 (en) Fraud Detection in Self-Service Terminal
JP4785651B2 (en) Financial institution booth monitoring system
US11501301B2 (en) Transaction terminal fraud processing
CN111968315A (en) ATM monitoring method and device, storage medium and electronic equipment
US7451919B2 (en) Self-service terminal
CN106485849B (en) Method and system for monitoring and alarming technical condition of self-service terminal
WO2017109994A1 (en) Automated transaction system
JP2006331049A (en) Security monitoring system
US20230245534A1 (en) Atm fraud detection system and methods thereof
JP6931384B2 (en) Banking system, and how it is performed by the banking system
US20230042425A1 (en) Intelligent real time card alert system to detect suspicious contactless card reader
US11610457B2 (en) Detecting unauthorized activity related to a computer peripheral device by monitoring voltage of the peripheral device
US11631068B1 (en) Kiosk security system
JP2022127013A (en) Self-checkout system and program
CA2681226C (en) Apparatus and method for payment terminal fraud detection
US20230132132A1 (en) Card skimming detection
Hossain et al. Utilizing the Internet of Things, Monitoring and Protecting System for Automated Teller Machines
CN108399691B (en) ATM exception management method and system
US8746552B1 (en) Card reader activity systems and methods
KR101421371B1 (en) Method for Detecting Service Fault of a Large Scale Transaction
US20210125182A1 (en) Detection of a common point of compromise

Legal Events

Date Code Title Description
AS Assignment

Owner name: NCR CORPORATION, GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GHAFOOR, GAMEELAH;REEL/FRAME:035794/0204

Effective date: 20150527

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT

Free format text: SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:050874/0063

Effective date: 20190829

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:050874/0063

Effective date: 20190829

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PROPERTY NUMBERS SECTION TO REMOVE PATENT APPLICATION: 15000000 PREVIOUSLY RECORDED AT REEL: 050874 FRAME: 0063. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:057047/0161

Effective date: 20190829

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PROPERTY NUMBERS SECTION TO REMOVE PATENT APPLICATION: 150000000 PREVIOUSLY RECORDED AT REEL: 050874 FRAME: 0063. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:057047/0161

Effective date: 20190829

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: CITIBANK, N.A., NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:NCR ATLEOS CORPORATION;REEL/FRAME:065331/0297

Effective date: 20230927

AS Assignment

Owner name: NCR VOYIX CORPORATION, GEORGIA

Free format text: RELEASE OF PATENT SECURITY INTEREST;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:065346/0531

Effective date: 20231016

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NORTH CAROLINA

Free format text: SECURITY INTEREST;ASSIGNORS:NCR ATLEOS CORPORATION;CARDTRONICS USA, LLC;REEL/FRAME:065346/0367

Effective date: 20231016

AS Assignment

Owner name: CITIBANK, N.A., NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE DOCUMENT DATE AND REMOVE THE OATH/DECLARATION (37 CFR 1.63) PREVIOUSLY RECORDED AT REEL: 065331 FRAME: 0297. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR ATLEOS CORPORATION;REEL/FRAME:065627/0332

Effective date: 20231016